When you consider the extraordinary rate at which identity crimes occur — impacting consumers every two seconds according to Javelin Strategy and Research — such a high degree of fear seems logical. Identity crimes also threaten a consumers’ sense of control, a need so vital that people are forever seeking ways to gain it in all aspects of their lives.
2014 was “The Year of the Breach.” 2015 continues to bring to the public spotlight data breaches cases that should make any business reflect on its own information security plan, and become more cautious with respect to their data, employees and business practices.
Keeping a business protected is more important now than ever. With recent hacks coming to light such as the SONY and Anthem Blue Shield attacks that compromised hundreds of thousands of customer personal information, it makes sense to protect your business when it begins to use social media for branding and promotional campaigns so that you business and customers don't fall victim to similar crimes.
Private data is now a very public issue. For the first time in history, people recognize that businesses store their information and they want to know how – and why. They want to know why websites need their email address so badly, and they understand that private photos can be hacked.
Uber is providing impacted drivers with one year of f ree credit monitoring services and will be filing a “John Doe” lawsuit so they can more effectively gather breach-related information in order to determine the responsible third-party.
Mobile payments. We’ve seen through news coverage, conversations with friends and family and our own usage how pervasive this technology has become this past year. To go beyond the buzz, MasterCard partnered with Prime Research , to identify evolving consumer attitudes toward digital payments and...
Citizenfour, the documentary on Edward Snowden's data release of U.S. Government surveillance programs, brought terms like "Deep Web" and "Dark Net" into our daily language. But what are these things and how do you access them?